PCP Soundness amplification Meeting 2 ITCS, Tsinghua Univesity, Spring April 2009

Size: px
Start display at page:

Download "PCP Soundness amplification Meeting 2 ITCS, Tsinghua Univesity, Spring April 2009"

Transcription

1 PCP Soundness amplification Meeting 2 ITCS, Tsinghua Univesity, Spring April 2009 Speaker: Andrej Bogdanov Notes by: Andrej Bogdanov Recall the definition of probabilistically checkable proofs (PCP) from last time. We say L admits a PCP of completeness c, soundness s, alphabet Σ, randomness complexity r and query complexity q if there is a randomized polynomial-time verifier V which, on input x of length n, and oracle access to a proof π Σ, uses at most r(n) random coins to select q(n) nonadaptive queries into π and x L π : Pr[V π (x) = 1] c x L π : Pr[V π (x) = 1] s. We denote the class of all such problems L by PCP Σ c,s(r(n), q(n)). The PCP theorem states that Theorem 1 (PCP theorem). SAT PCP {0,1} 1,1/2 (O(log n), O(1)). The most interesting applications of the PCP theorem concern hardness of approximation. Last time we explained this connection by showing how a PCP can be equivalently viewed as a constraint satisfaction problem Ψ with 2 r(n) constraints, each of which contains q(n) variables taking values in Σ. The PCP theorem then states that for r(n) = O(log n) and q(n) = O(1), it is NP-hard to distinguish between the case when all constraints can be simultaneously satisfied and no more than half of them can be satisfied. Here we will always be interested PCPs with randomness complexity O(log n) and mainly consider PCPs with query complexity 2. This is the setting which is most useful for proving various hardness of approximation results and in particular the setting of the unique games conjecture. 1 PCP transformations All theorems in the PCP literature are proved by way of reduction. Proving a PCP theorem amounts to controlling various parameters in the reduction. For example, let s take Håstad celebrated hardness result on systems of linear equations modulo 2 with three variables per equation (3LIN- 2). Håstad proves that it is NP-hard to distinguish between the case when 1 ε of the equations can be satisfied and when not even 1/2 + ε of them can be satisfied for any constant ε > 0. How does Håstad prove his theorem? We cannot go into much detail here but let s at least outline the proof. In PCP language, he is looking to design a PCP with alphabet Σ = {0, 1}, query complexity 3, completeness 1 ε, and soundness 1/2 + ε, and the verifier works in a particular way always XORs the 3 queried bits and compares them against some precomputed answer. The PCP theorem gives some PCP for NP, but far from one with all these required properties. The idea behind Håstad proof (and most PCP proofs) is to start from the PCP theorem and make various transformations (reductions) which will improve it in various ways that are useful for the 1

2 2 application. But it is not always obvious how to proceed. For example Håstad s problem requires improving the query complexity from O(1) to 3, but only affecting completeness and soundness by a little ε! One easy transformation for improving the query complexity is one we discussed last time: Augment the proof with a part π which contains the values of q-tuples of variables appearing in each constraint of Ψ. Then replace V by a new verifier V that queries a random entry ψ inside π together with a random variable x v that appears in ψ inside π and checks for consistency. Call the new constraint satisfaction problem Ψ. By this transformation it is not difficult to see that Theorem 2 (Query reduction). PCP Σ 1,1 δ (r(n), q) PCPΣq 1,1 δ/q (r(n) + log q, 2) showing that the query complexity can be brought down to 3 (even 2), but the soundness and alphabet size go up. So to win in one of the parameters we have to lose in the other ones. Despite this, it turns out that this is a useful transformation to do in Håstad s proof. It turns out that even though the soundness deteriorated significantly by query reduction, it can be improved significantly by a transformation called parallel repetition which preserves query complexity and completeness, but deteriorates alphabet size: Theorem 3 (Soundness amplification via parallel repetition). For every k > 0, PCP Σ 1,s(r(n), 2) PCP Σk 1,s (kr(n), 2), where s = 1 δ and s = 2 Ω Σ(δ 3 k). After performing parallel repetition, we have a PCP with very low soundness, two queries, but enormous alphabet size. The alphabet size can then be reduced by another transformation called the long code. The philosophy behind many PCP proofs is similar. It is often impossible to do everything in one step, so one goes through a sequence of small steps, each of which makes some improvement in one of the parameters while ruining the other ones. 2 The unique games conjecture Håstad s scheme for proving inapproximability results has shown successful in many different applications. In short, this kind of reduction consists of the following steps: NP-hardness of SAT (1) PCP theorem (2) query reduction (3) soundness amplification (4) long code

3 3 approximation hardness of 3LIN-2 After his work, it turned out that the same framework can also be used to prove hardness of approximation of many other problems. One remarkable thing about all these proofs is that steps (1) to (3) are the same in all of them; all they differ in is in the implementation of step (4). So from the perspective of proving hardness of approximation results, it turned out useful to abstract steps (1)-(3) into the following PCP theorem. Theorem 4. For every δ > 0 there exists an alphabet Σ such that SAT PCP Σ 1,δ (O(log n), 2). Moreover, the PCP verifier has the following projection property: Once the answer to the first query is revealed, there is exactly one possible answer to the second query that makes the verifier accept. It turns out that this projection property is crucial in several proofs (including Håstad s proof). Later, it became apparent that if the projection property can be strengthened (at a small cost in completeness), many new and improved hardness of approximation results can be obtained. This strengthening was suggested by Khot and has not been proved yet. Conjecture 1 (Khot s unique games conjecture). For every ε, δ > 0 there exists an alphabet Σ such that SAT PCP Σ 1 ε,δ (O(log n), 2). Moreover, the PCP verifier has the following uniqueness property: For every possible answer to the first query, there is exactly one possible answer to the second query that makes the verifier accept, and vice versa. The corresponding CSP is called a unique game because it consists of binary constraints which are all permutations: The value of one variable completely determines the value of the other, and vice versa. The unique games conjecture implies many optimal hardness of approximation results for natural NP problems. But why should we believe that the conjecture is true? One reason to believe is the abnormal success people have had proving all sorts of PCP theorems by various transformations like the ones we mentioned. Perhaps such a transformation can be applied to one of the many PCP theorems we know to prove the unique games conjecture. Discussion Since the key step in proving Theorem 4 (PCPs with projection property) was a soundness amplification step, I think it is reasonable to believe that soundness amplification should play a key role in the proof of the unique games conjecture. Here is one proof attempt of the unique games conjecture by dream soundness amplification. It follows from Håstad s result that there exist two constants s < c < 1 (I think s 0.91, c 0.94) such that it is NP-hard to distinguish graphs whose max-cut has size c from those whose max-cut has size s. Max-cut is a unique game. If we could run some transformation that keeps c close to 1 and makes s close to 0, while preserving query complexity and uniqueness, we would have proved the conjecture.

4 4 There is also the possibility that the unique games conjecture is false. However, the best known algorithms for constraint satisfaction problems fail to disprove the conjecture. While it is certainly a reasonable possibility that the conjecture is false, it seems that refuting it might require some significant advances in algorithms. There is a third alternative that I believe has not been seriously investigated yet: The unique games conjecture may not be provable using current techniques. Complexity theory has been generally very successful at making arguments of this type (e.g. oracle separations, natural proofs,...) but these tools have not been applied to the investigation of unique games. I think this is a worthwhile direction. Before we get into anything, I think it will be useful to build up our arsenal of soundness amplification techniques. We already saw one sequential amplification but that had the unfortunate effect of blowing up the query complexity. Instead we want to focus on soundness amplification that preserve low query complexity (ideally 2 queries). We ll start with Dinur s gap amplification technique. 3 Dinur s proof of the PCP theorem As we discussed above, PCP transformations that improve one parameter at the cost of others are important tools in going from the PCP theorem to hardness of approximation results. Irit Dinur realized that such transformations can yield a proof of the PCP theorem itself. Dinur s starting point is the fact that the NP-hardness of 3-coloring (3COL) can be viewed as a very weak CSP harndess of approximation result. If there are m edges in the graph, it says that it is hard to distinguish satisfiable instances from those where no more than 1 δ fraction of constraints can be satisfied, where δ = 1/m. Then she designs an efficient transformation that looks roughly as follows: Ψ (3COL instance) Ψ (3COL instance) number of edges m Cm (C is some constant) completeness 1 1 soundness 1 δ 1 2δ (for δ < 1/C) Repeating this transformation O(log m) times yields the PCP theorem. To implement this transformation, it turns out that it helps to apply a similar strategy as in the proof of Theorem 4. The transformation consists of several stages (smaller transformations), where at each stage one of the parameters is improved, but at the expense of the others. At the end, we achieve an improvement in soundness while paying a small price in the size of the instance (randomness complexity of the PCP). To explain the various parameters, we need a bit of notation. The constraint graph of a CSP Ψ with 2 variables per constraint (equivalently a PCP with query complexity 2) is the graph whose vertices v correspond to variables x v in the CSP and where for each constraint ψ(x u, x v ) in Ψ there

5 5 is an edge (u, v) in the graph. Multiple edges are allowed, and we will keep the graph undirected (as the CSP constraints will be symmetric). The size of a CSP is the number of constraints in it. Abusing notation, we will say Ψ has degree d if its constraint graph is a regular graph of degree d, and the expansion of Ψ is the spectral gap 1 λ(g) of its underlying constraint graph G. Dinur s proof of the PCP theorem goes through the following sequence of transformations: transform size Σ degree arity soundness gap expansion reduce arity m 2 k = C δ reduce degree C 2 k 2 C small expanderize C 2 k d = C 2 C 1/2 amplify gap d t 2 kdt d t+1 2 t/poly( Σ ) reduce alphabet 2 2kdt 2 k = C C While all of these are interesting, the ultimate goal here is to improve the soundness, so we will focus on the gap amplification step. In fact, all the other transformations can be viewed as auxiliary steps whose objective is to put the constraint graph in the right form so that gap amplification can be applied. 4 Gap amplification Fix a constant t. The gap amplification step is a transformation from a 2CSP Ψ with degree d and expansion 1/2 to a 2CSP Ψ with the following parameters: Ψ Ψ size m ( Σ d) 5t m alphabet size Σ Σ 1+d+d2 + +d t completeness 1 1 soundness 1 δ 1 Ω(tδ/ Σ 4 ) We will describe a slightly modified version of Dinur s transformation due to Jaikumar Radhakrishnan. Let G be the constraint graph of Ψ. We define the instance Ψ as follows: Variables of Ψ : For each variable x v of Ψ, there is a corresponding variable x v of Ψ. Values of x v: The value of x v is a collection (tuple) of values in Σ, one corresponding to every vertex u at distance t from v in G. We write x v(u) for the component of x v corresponding to u. Distribution over constraints of Ψ : The constraints ψ p of Ψ correspond to paths p of length at most 5t ln Σ in G. (Abusing notation we will identify constraints and the paths they represent.) The paths are generated from the following distribution:

6 6 1. Choose a starting vertex v 0 of p. Set i = 0 2. Repeat for at most 5t ln Σ times: (1) Set v i+1 to be a random neighbor of v i and increment i (2) With probability 1/t, stop the repetition. 3. Output the path v 0, v 1,..., v i. Constraints of Ψ : Let (u, v ) be the endpoints of a path p. The constraint ψ p(x u, x v ) is satisfied if all of the following hold: 1. For every edge (u, v) in G such that u and v are both within distance t of u, the constraint ψ (u,v) is satisfied. 2. For every edge (u, v) in G such that u and v are both within distance t of v, the constraint ψ (u,v) is satisfied. 3. For every vertex v that is within distance t from both u and v, x u (v) = x v (v). The size and alphabet size of Ψ are easy to check. We need to argue completeness and soundness. By design, the transformation has perfect completeness. Suppose x is a satisfying assignment of Ψ. Now consider the assignment x of Ψ given by x u(v) = x v. This satisfies all the constraints of Ψ. The (relatively) difficult part is to argue soundness. To do this, we must show that for every x that satisfies 1 Ω Σ (tδ) constraints of Ψ, there is an x that satisfies 1 δ constraints of Ψ. The assignment x is constructed from x via the following procedure. For every vertex v, 1. Define the following distribution D v on vertices. Initially, set v v. Now repeat the following experiment: (1) With probability 1/t stop, and with the remaining probability, set v a random neighbor of v. 2. Set x v to equal the plurality value of x v (v), when v is chosen from D v, among those v that are within distance t of v. We now need to argue that if x satisfies 1 Ω(tδ/ Σ 4 ) constraints of Ψ, then x satisfies 1 δ constraints of Ψ. In fact, we will argue the contrapositive: Claim 5. Assume tδ < 1. If x violates δ constraints of Ψ, then x violates Ω(tδ/ Σ 4 ) constraints of Ψ. Before we prove the claim, let us make one simplification. We will modify the distribution over constraints of Ψ so that the path p is not truncated after 5t ln Σ steps (see step 2), but can be of any length. Intuitively, this simplification should not make a difference because long paths are unlikely. Formally, we will analyze the effect of this simplification later. Now let s explain the intuition behind this claim. Let F be the set of constraints of Ψ (which we also think of as edges of G) that are violated by x (so F = δm). Now take a random constraint ψ of Ψ. What are the chances that this constraint is violated by x? We have that Pr[x violates ψ ] = Pr[ψ intersects F ] Pr[x violates ψ ψ intersects F ].

7 7 Let s try to estimate both of these quantities. We expect ψ to have about 1/t edges; since F = δm, we expect ψ to contain about δt edges of F. Since δ is fairly small, we might expect that most ψ which intersect F intersect only a single edge of F. If this is the case, then Pr[ψ intersects F ] should be about δt. Roughly, this is where the soundness amplification happens: While bad edges occur in Ψ only with probability δ, they occur in Ψ with probability about tδ. What about the other probability? Let s now fix an edge (u, v) F that is contained in ψ. Now consider the distribution of the endpoints u and v of the path ψ. Since the endpoints of the path are determined by a Poisson process, it follows that conditioned on (u, v) being in ψ, the endpoint v is determined by the following distribution: Start from v and at each step (1) with probability 1/t stop and (2) with the remaining probability move to a random neighbor of v and continue. But this is exactly the distribution D v! Ignoring for now the fact that ψ could be too long, we reason as follows. Since the value x v was defined as the plurality value x v (v), the two should match with probability 1/ Σ. For the same reason, x u (u) and x u should match with probability 1/ Σ. But since the constraint ψ(x u, x v ) is violated, this implies ψ (x u, x v ) is also violated. So roughly, we expect that the probability that a random constraint of Ψ is violated is about δt/ Σ 2. However, our analysis ignored several crucial points, namely: Why can we assume that few ψ intersect multiple edges of F? What happens when ψ contains more than 1/t edges? In this case, it may happen that ψ contains a bad edge, but this edge cannot be seen from its endpoints. Roughly, the answer is: (1) The fact that ψ is unlikely to intersect many edges of F follows from the expansion of G and (2) Long paths will contribute little to the analysis as they only happen with small probability. 5 Analysis of gap amplification Now let us do the actual analysis. Call an edge (u, v) faulty (with respect to ψ, x, x) if (1) (u, v) F, (2) d(u, u), d(v, v ) < t, and (3) x u (u) = x u and x v (v) = x v, where u, v are the endpoints of ψ. If some edge in ψ is faulty, then ψ is violated as the inconsistency between x u and x v can be seen either by x u or by x v. Let N denote the number of faulty edges of ψ, where ψ is chosen at random. We have that Pr[ψ is violated] Pr[N > 0] E[N] 2 / E[N 2 ]. (1) The first moment. We first estimate E[N]. For f F, let N f denote the number of occurrences of f in ψ if f is faulty, and 0 otherwise. Then E[N] = f F E[N f ] f F Pr[N f > 0]. The probability that f = (u, v) occurs in ψ is exactly t/m. Conditioned on this, we analyze the probability that (u, v) is faulty. As discussed above, u follows the distribution D u, and v

8 8 independently follows the distribution D v. In this distribution, the probability that u is at distance more than t from u is (1 1/t) t < 1/2. Conditioned on this distance being at most t, the distribution on u is exactly the one used to define the plurality assignment x u, so the probability that x u (u) = x u is at least 1/ Σ. As the same is true for v and v independently, we have that and Pr[N f > 0] (t/m) ( 1 2 E[N] tδ 1 4 Σ 2. 1 ) 2 Σ The second moment. We now upper bound E[N 2 ]. To do so, let N be the number of edges in F that intersect ψ. Obviously N N (since N counts the number of such edges that are also faulty). So we will bound E[N 2 ] instead. To do so, let Z i be a random variable that indicates if the ith edge of ψ is in F (if ψ has fewer than i edges, then Z i = 0). Then E[N 2 ] = E[Z i ] + 2 E[Z i Z j ]. (2) i=1 1 i<j It is easily seen that E[Z i ] = δ (1 1/t) i, so the first summation is at most tδ. For the second summation, notice that E[Z i Z j ] is the probability that both edges i and j are present in the path and faulty. The probability they are both present is (1 1/t) j. Conditioned on them being both present, the probability they are both faulty is bounded using the following lemma. Lemma 6. Let G be a d-regular graph with spectral gap 1 λ and F be a subset of edges of G of density δ. Consider the following process: First, choose a random edge e of G, then take a random edge connecting to it, and so on for l steps. Call the final edge e. The probability that both e and e are in F is at most δ 2 + δλ l. It follows that E[Z i Z j ] (1 1/t) j δ (δ + λ j i ). Plugging this in (2) we have E[N 2 ] δt + 2δ E[Z i Z j ] δt + 2δ δt + 2δ 1 i<j (1 1/t) i (1 1/t) j i (δ + λ j i ) i=1 j=i+1 (1 1/t) i (δt + 1/(1 λ)) i=1 δt + 2δt(δt + 2) = 5δt + 2(δt) 2. Second moment calculation. Finally, from (1) we have: Pr[N > 0] E[N]2 E[N 2 ] (tδ/4 Σ )2 5δt + 2(δt) 2 = Ω(tδ/ Σ 4 ).

9 9 On the truncation of paths. This calculation was done in the idealized setting where ψ can be arbitrarily long, while it is actually restricted to have length at most 5t ln Σ. It is not hard to see that these long paths contribute little to N. In particular, the contribution from the long paths can be bounded by l=5t ln Σ E[N ψ has length l] Pr[ψ has length l] l=5t ln Σ (δl) (1 1/t) l < E[N]/2 For the calculation of E[N 2 ], the truncation of long paths only improves this quantity, so the lower bound on the probability that N > 0 is only affected by a constant. Proof of Lemma 6. Consider the graph H whose vertices correspond to the edges of G and where (e, e ) are adjacent in H every time they share an endpoint as edges of G. Then the process described above is simply a random walk of length l in H, or equivalently a random edge in H l. By the expander mixing lemma applied to H, the probability that both edges e and e fall inside F is upper bounded by δ 2 + λ(h l )δ = δ 2 + λ(h) l δ. It remains to see that λ(h) λ(g). In fact, we will show that all the eigenvalues of H are either 0 or eigenvalues of G. To see this, let λ be any eigenvalue of H, so that for some eigenvector v va H = λv. Here A H is the adjacency matrix of H. Let E be the incidence matrix of G: E is an m by n matrix where E e,v is 1 if vertex v is incident to edge e and 0 otherwise. Then A H = EE T, and Multiplying both sides by E we obtain vee T = λv. (ve)(e T E) = λ(ve) it follows that either ve = 0, so that λ = 0, or λ is an eigenvalue of E T E. But E T E = A G, the adjacency matrix of G.

CSC 5170: Theory of Computational Complexity Lecture 13 The Chinese University of Hong Kong 19 April 2010

CSC 5170: Theory of Computational Complexity Lecture 13 The Chinese University of Hong Kong 19 April 2010 CSC 5170: Theory of Computational Complexity Lecture 13 The Chinese University of Hong Kong 19 April 2010 Recall the definition of probabilistically checkable proofs (PCP) from last time. We say L has

More information

Lecture 17 November 8, 2012

Lecture 17 November 8, 2012 6.841: Advanced Complexity Theory Fall 2012 Prof. Dana Moshkovitz Lecture 17 November 8, 2012 Scribe: Mark Bun 1 Overview In the previous lecture, we saw an overview of probabilistically checkable proofs,

More information

On the efficient approximability of constraint satisfaction problems

On the efficient approximability of constraint satisfaction problems On the efficient approximability of constraint satisfaction problems July 13, 2007 My world Max-CSP Efficient computation. P Polynomial time BPP Probabilistic Polynomial time (still efficient) NP Non-deterministic

More information

1 Probabilistically checkable proofs

1 Probabilistically checkable proofs CSC 5170: Theory of Computational Complexity Lecture 12 The Chinese University of Hong Kong 12 April 2010 Interactive proofs were introduced as a generalization of the classical notion of a proof in the

More information

The PCP Theorem by Gap Amplification

The PCP Theorem by Gap Amplification The PCP Theorem by Gap Amplification Irit Dinur February 13, 2007 Abstract The PCP theorem [3, 2] says that every language in NP has a witness format that can be checked probabilistically by reading only

More information

Limits to Approximability: When Algorithms Won't Help You. Note: Contents of today s lecture won t be on the exam

Limits to Approximability: When Algorithms Won't Help You. Note: Contents of today s lecture won t be on the exam Limits to Approximability: When Algorithms Won't Help You Note: Contents of today s lecture won t be on the exam Outline Limits to Approximability: basic results Detour: Provers, verifiers, and NP Graph

More information

1 Agenda. 2 History. 3 Probabilistically Checkable Proofs (PCPs). Lecture Notes Definitions. PCPs. Approximation Algorithms.

1 Agenda. 2 History. 3 Probabilistically Checkable Proofs (PCPs). Lecture Notes Definitions. PCPs. Approximation Algorithms. CS 221: Computational Complexity Prof. Salil Vadhan Lecture Notes 20 April 12, 2010 Scribe: Jonathan Pines 1 Agenda. PCPs. Approximation Algorithms. PCPs = Inapproximability. 2 History. First, some history

More information

Probabilistically Checkable Proofs. 1 Introduction to Probabilistically Checkable Proofs

Probabilistically Checkable Proofs. 1 Introduction to Probabilistically Checkable Proofs Course Proofs and Computers, JASS 06 Probabilistically Checkable Proofs Lukas Bulwahn May 21, 2006 1 Introduction to Probabilistically Checkable Proofs 1.1 History of Inapproximability Results Before introducing

More information

The PCP Theorem by Gap Amplification

The PCP Theorem by Gap Amplification Electronic Colloquium on Computational Complexity, Revision 1 of Report No. 46 (2005) The PCP Theorem by Gap Amplification Irit Dinur September 25, 2005 Abstract We describe a new proof of the PCP theorem

More information

Lecture 18: PCP Theorem and Hardness of Approximation I

Lecture 18: PCP Theorem and Hardness of Approximation I Lecture 18: and Hardness of Approximation I Arijit Bishnu 26.04.2010 Outline 1 Introduction to Approximation Algorithm 2 Outline 1 Introduction to Approximation Algorithm 2 Approximation Algorithm Approximation

More information

Lecture 12 Scribe Notes

Lecture 12 Scribe Notes 6.890: Algorithmic Lower Bounds: Fun With Hardness Proofs Fall 04 Prof. Erik Demaine Lecture Scribe Notes Recap For the past two classes, we ve been covering inapproximability, some of its reduction styles,

More information

Lower Bounds for Testing Bipartiteness in Dense Graphs

Lower Bounds for Testing Bipartiteness in Dense Graphs Lower Bounds for Testing Bipartiteness in Dense Graphs Andrej Bogdanov Luca Trevisan Abstract We consider the problem of testing bipartiteness in the adjacency matrix model. The best known algorithm, due

More information

Computational Complexity: Problem Set 4

Computational Complexity: Problem Set 4 Computational Complexity: Problem Set 4 Due: Friday January 8, 16, at 3:59 AoE. Submit your solutions as a PDF le by e-mail to jakobn at kth dot se with the subject line Problem set 4: your full name.

More information

Non-Approximability Results (2 nd part) 1/19

Non-Approximability Results (2 nd part) 1/19 Non-Approximability Results (2 nd part) 1/19 Summary - The PCP theorem - Application: Non-approximability of MAXIMUM 3-SAT 2/19 Non deterministic TM - A TM where it is possible to associate more than one

More information

Introduction Long transparent proofs The real PCP theorem. Real Number PCPs. Klaus Meer. Brandenburg University of Technology, Cottbus, Germany

Introduction Long transparent proofs The real PCP theorem. Real Number PCPs. Klaus Meer. Brandenburg University of Technology, Cottbus, Germany Santaló s Summer School, Part 3, July, 2012 joint work with Martijn Baartse (work supported by DFG, GZ:ME 1424/7-1) Outline 1 Introduction 2 Long transparent proofs for NP R 3 The real PCP theorem First

More information

1 More finite deterministic automata

1 More finite deterministic automata CS 125 Section #6 Finite automata October 18, 2016 1 More finite deterministic automata Exercise. Consider the following game with two players: Repeatedly flip a coin. On heads, player 1 gets a point.

More information

DD2446 Complexity Theory: Problem Set 4

DD2446 Complexity Theory: Problem Set 4 DD2446 Complexity Theory: Problem Set 4 Due: Friday November 8, 2013, at 23:59. Submit your solutions as a PDF le by e-mail to jakobn at kth dot se with the subject line Problem set 4: your full name.

More information

Approximating MAX-E3LIN is NP-Hard

Approximating MAX-E3LIN is NP-Hard Approximating MAX-E3LIN is NP-Hard Evan Chen May 4, 2016 This lecture focuses on the MAX-E3LIN problem. We prove that approximating it is NP-hard by a reduction from LABEL-COVER. 1 Introducing MAX-E3LIN

More information

Overview. 1 Introduction. 2 Preliminary Background. 3 Unique Game. 4 Unique Games Conjecture. 5 Inapproximability Results. 6 Unique Game Algorithms

Overview. 1 Introduction. 2 Preliminary Background. 3 Unique Game. 4 Unique Games Conjecture. 5 Inapproximability Results. 6 Unique Game Algorithms Overview 1 Introduction 2 Preliminary Background 3 Unique Game 4 Unique Games Conjecture 5 Inapproximability Results 6 Unique Game Algorithms 7 Conclusion Antonios Angelakis (NTUA) Theory of Computation

More information

Advanced Algorithms (XIII) Yijia Chen Fudan University

Advanced Algorithms (XIII) Yijia Chen Fudan University Advanced Algorithms (XIII) Yijia Chen Fudan University The PCP Theorem Theorem NP = PCP(log n, 1). Motivation Approximate solutions Definition (Approximation of MAX-3SAT) For every 3CNF formula ϕ, the

More information

Great Theoretical Ideas in Computer Science

Great Theoretical Ideas in Computer Science 15-251 Great Theoretical Ideas in Computer Science Lecture 28: A Computational Lens on Proofs December 6th, 2016 Evolution of proof First there was GORM GORM = Good Old Regular Mathematics Pythagoras s

More information

2 Completing the Hardness of approximation of Set Cover

2 Completing the Hardness of approximation of Set Cover CSE 533: The PCP Theorem and Hardness of Approximation (Autumn 2005) Lecture 15: Set Cover hardness and testing Long Codes Nov. 21, 2005 Lecturer: Venkat Guruswami Scribe: Atri Rudra 1 Recap We will first

More information

CS286.2 Lecture 8: A variant of QPCP for multiplayer entangled games

CS286.2 Lecture 8: A variant of QPCP for multiplayer entangled games CS286.2 Lecture 8: A variant of QPCP for multiplayer entangled games Scribe: Zeyu Guo In the first lecture, we saw three equivalent variants of the classical PCP theorems in terms of CSP, proof checking,

More information

PCPs and Inapproximability Gap-producing and Gap-Preserving Reductions. My T. Thai

PCPs and Inapproximability Gap-producing and Gap-Preserving Reductions. My T. Thai PCPs and Inapproximability Gap-producing and Gap-Preserving Reductions My T. Thai 1 1 Hardness of Approximation Consider a maximization problem Π such as MAX-E3SAT. To show that it is NP-hard to approximation

More information

Two Query PCP with Sub-Constant Error

Two Query PCP with Sub-Constant Error Electronic Colloquium on Computational Complexity, Report No 71 (2008) Two Query PCP with Sub-Constant Error Dana Moshkovitz Ran Raz July 28, 2008 Abstract We show that the N P-Complete language 3SAT has

More information

The expansion of random regular graphs

The expansion of random regular graphs The expansion of random regular graphs David Ellis Introduction Our aim is now to show that for any d 3, almost all d-regular graphs on {1, 2,..., n} have edge-expansion ratio at least c d d (if nd is

More information

1 Adjacency matrix and eigenvalues

1 Adjacency matrix and eigenvalues CSC 5170: Theory of Computational Complexity Lecture 7 The Chinese University of Hong Kong 1 March 2010 Our objective of study today is the random walk algorithm for deciding if two vertices in an undirected

More information

Approximation & Complexity

Approximation & Complexity Summer school on semidefinite optimization Approximation & Complexity David Steurer Cornell University Part 1 September 6, 2012 Overview Part 1 Unique Games Conjecture & Basic SDP Part 2 SDP Hierarchies:

More information

Lecture 15: A Brief Look at PCP

Lecture 15: A Brief Look at PCP IAS/PCMI Summer Session 2000 Clay Mathematics Undergraduate Program Basic Course on Computational Complexity Lecture 15: A Brief Look at PCP David Mix Barrington and Alexis Maciel August 4, 2000 1. Overview

More information

P versus NP over Various Structures

P versus NP over Various Structures 26th ESSLLI Summer School 2014, Tübingen, August 2014 PART 5: Probabilistically Checkable Proofs jointly with J.A. Makowsky Outline for today 1 Introduction 2 Verifiers and real PCP classes 3 The classical

More information

A Linear Round Lower Bound for Lovasz-Schrijver SDP Relaxations of Vertex Cover

A Linear Round Lower Bound for Lovasz-Schrijver SDP Relaxations of Vertex Cover A Linear Round Lower Bound for Lovasz-Schrijver SDP Relaxations of Vertex Cover Grant Schoenebeck Luca Trevisan Madhur Tulsiani Abstract We study semidefinite programming relaxations of Vertex Cover arising

More information

Lecture 10: Hardness of approximating clique, FGLSS graph

Lecture 10: Hardness of approximating clique, FGLSS graph CSE 533: The PCP Theorem and Hardness of Approximation (Autumn 2005) Lecture 10: Hardness of approximating clique, FGLSS graph Nov. 2, 2005 Lecturer: Venkat Guruswami and Ryan O Donnell Scribe: Ioannis

More information

CSC 5170: Theory of Computational Complexity Lecture 9 The Chinese University of Hong Kong 15 March 2010

CSC 5170: Theory of Computational Complexity Lecture 9 The Chinese University of Hong Kong 15 March 2010 CSC 5170: Theory of Computational Complexity Lecture 9 The Chinese University of Hong Kong 15 March 2010 We now embark on a study of computational classes that are more general than NP. As these classes

More information

Reading group: proof of the PCP theorem

Reading group: proof of the PCP theorem Reading group: proof of the PCP theorem 1 The PCP Theorem The usual formulation of the PCP theorem is equivalent to: Theorem 1. There exists a finite constraint language A such that the following problem

More information

Approximation algorithm for Max Cut with unit weights

Approximation algorithm for Max Cut with unit weights Definition Max Cut Definition: Given an undirected graph G=(V, E), find a partition of V into two subsets A, B so as to maximize the number of edges having one endpoint in A and the other in B. Definition:

More information

1 Computational problems

1 Computational problems 80240233: Computational Complexity Lecture 1 ITCS, Tsinghua Univesity, Fall 2007 9 October 2007 Instructor: Andrej Bogdanov Notes by: Andrej Bogdanov The aim of computational complexity theory is to study

More information

Lecture 16: Constraint Satisfaction Problems

Lecture 16: Constraint Satisfaction Problems A Theorist s Toolkit (CMU 18-859T, Fall 2013) Lecture 16: Constraint Satisfaction Problems 10/30/2013 Lecturer: Ryan O Donnell Scribe: Neal Barcelo 1 Max-Cut SDP Approximation Recall the Max-Cut problem

More information

On the Complexity of the Minimum Independent Set Partition Problem

On the Complexity of the Minimum Independent Set Partition Problem On the Complexity of the Minimum Independent Set Partition Problem T-H. Hubert Chan 1, Charalampos Papamanthou 2, and Zhichao Zhao 1 1 Department of Computer Science the University of Hong Kong {hubert,zczhao}@cs.hku.hk

More information

DRAFT. PCP and Hardness of Approximation. Chapter 19

DRAFT. PCP and Hardness of Approximation. Chapter 19 Chapter 19 PCP and Hardness of Approximation...most problem reductions do not create or preserve such gaps...to create such a gap in the generic reduction (cf. Cook)...also seems doubtful. The intuitive

More information

Lecture 12: Interactive Proofs

Lecture 12: Interactive Proofs princeton university cos 522: computational complexity Lecture 12: Interactive Proofs Lecturer: Sanjeev Arora Scribe:Carl Kingsford Recall the certificate definition of NP. We can think of this characterization

More information

6.080 / Great Ideas in Theoretical Computer Science Spring 2008

6.080 / Great Ideas in Theoretical Computer Science Spring 2008 MIT OpenCourseWare http://ocw.mit.edu 6.080 / 6.089 Great Ideas in Theoretical Computer Science Spring 2008 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms.

More information

Chapter 11 - Sequences and Series

Chapter 11 - Sequences and Series Calculus and Analytic Geometry II Chapter - Sequences and Series. Sequences Definition. A sequence is a list of numbers written in a definite order, We call a n the general term of the sequence. {a, a

More information

Lecture 10 + additional notes

Lecture 10 + additional notes CSE533: Information Theorn Computer Science November 1, 2010 Lecturer: Anup Rao Lecture 10 + additional notes Scribe: Mohammad Moharrami 1 Constraint satisfaction problems We start by defining bivariate

More information

Languages, regular languages, finite automata

Languages, regular languages, finite automata Notes on Computer Theory Last updated: January, 2018 Languages, regular languages, finite automata Content largely taken from Richards [1] and Sipser [2] 1 Languages An alphabet is a finite set of characters,

More information

P P P NP-Hard: L is NP-hard if for all L NP, L L. Thus, if we could solve L in polynomial. Cook's Theorem and Reductions

P P P NP-Hard: L is NP-hard if for all L NP, L L. Thus, if we could solve L in polynomial. Cook's Theorem and Reductions Summary of the previous lecture Recall that we mentioned the following topics: P: is the set of decision problems (or languages) that are solvable in polynomial time. NP: is the set of decision problems

More information

Lecture 6: Powering Completed, Intro to Composition

Lecture 6: Powering Completed, Intro to Composition CSE 533: The PCP Theorem and Hardness of Approximation (Autumn 2005) Lecture 6: Powering Completed, Intro to Composition Oct. 17, 2005 Lecturer: Ryan O Donnell and Venkat Guruswami Scribe: Anand Ganesh

More information

CPSC 536N: Randomized Algorithms Term 2. Lecture 9

CPSC 536N: Randomized Algorithms Term 2. Lecture 9 CPSC 536N: Randomized Algorithms 2011-12 Term 2 Prof. Nick Harvey Lecture 9 University of British Columbia 1 Polynomial Identity Testing In the first lecture we discussed the problem of testing equality

More information

Approximation Resistance from Pairwise Independent Subgroups

Approximation Resistance from Pairwise Independent Subgroups 1/19 Approximation Resistance from Pairwise Independent Subgroups Siu On Chan UC Berkeley 2/19 Max-CSP Goal: Satisfy the maximum fraction of constraints Examples: 1 MAX-3XOR: x 1 + x 10 + x 27 = 1 x 4

More information

1 Recap: Interactive Proofs

1 Recap: Interactive Proofs Theoretical Foundations of Cryptography Lecture 16 Georgia Tech, Spring 2010 Zero-Knowledge Proofs 1 Recap: Interactive Proofs Instructor: Chris Peikert Scribe: Alessio Guerrieri Definition 1.1. An interactive

More information

Lecture 18: Zero-Knowledge Proofs

Lecture 18: Zero-Knowledge Proofs COM S 6810 Theory of Computing March 26, 2009 Lecture 18: Zero-Knowledge Proofs Instructor: Rafael Pass Scribe: Igor Gorodezky 1 The formal definition We intuitively defined an interactive proof to be

More information

Lecture 20: Course summary and open problems. 1 Tools, theorems and related subjects

Lecture 20: Course summary and open problems. 1 Tools, theorems and related subjects CSE 533: The PCP Theorem and Hardness of Approximation (Autumn 2005) Lecture 20: Course summary and open problems Dec. 7, 2005 Lecturer: Ryan O Donnell Scribe: Ioannis Giotis Topics we discuss in this

More information

Lecture 19: Interactive Proofs and the PCP Theorem

Lecture 19: Interactive Proofs and the PCP Theorem Lecture 19: Interactive Proofs and the PCP Theorem Valentine Kabanets November 29, 2016 1 Interactive Proofs In this model, we have an all-powerful Prover (with unlimited computational prover) and a polytime

More information

1 The Low-Degree Testing Assumption

1 The Low-Degree Testing Assumption Advanced Complexity Theory Spring 2016 Lecture 17: PCP with Polylogarithmic Queries and Sum Check Prof. Dana Moshkovitz Scribes: Dana Moshkovitz & Michael Forbes Scribe Date: Fall 2010 In this lecture

More information

Complexity Classes IV

Complexity Classes IV Complexity Classes IV NP Optimization Problems and Probabilistically Checkable Proofs Eric Rachlin 1 Decision vs. Optimization Most complexity classes are defined in terms of Yes/No questions. In the case

More information

NP-Hardness reductions

NP-Hardness reductions NP-Hardness reductions Definition: P is the class of problems that can be solved in polynomial time, that is n c for a constant c Roughly, if a problem is in P then it's easy, and if it's not in P then

More information

Lecture Hardness of Set Cover

Lecture Hardness of Set Cover PCPs and Inapproxiability CIS 6930 October 5, 2009 Lecture Hardness of Set Cover Lecturer: Dr. My T. Thai Scribe: Ying Xuan 1 Preliminaries 1.1 Two-Prover-One-Round Proof System A new PCP model 2P1R Think

More information

: Computational Complexity Lecture 3 ITCS, Tsinghua Univesity, Fall October 2007

: Computational Complexity Lecture 3 ITCS, Tsinghua Univesity, Fall October 2007 80240233: Computational Complexity Lecture 3 ITCS, Tsinghua Univesity, Fall 2007 16 October 2007 Instructor: Andrej Bogdanov Notes by: Jialin Zhang and Pinyan Lu In this lecture, we introduce the complexity

More information

Complexity and NP-completeness

Complexity and NP-completeness Lecture 17 Complexity and NP-completeness Supplemental reading in CLRS: Chapter 34 As an engineer or computer scientist, it is important not only to be able to solve problems, but also to know which problems

More information

Today. Few Comments. PCP Theorem, Simple proof due to Irit Dinur [ECCC, TR05-046]! Based on some ideas promoted in [Dinur- Reingold 04].

Today. Few Comments. PCP Theorem, Simple proof due to Irit Dinur [ECCC, TR05-046]! Based on some ideas promoted in [Dinur- Reingold 04]. Today Few Comments PCP Theorem, Simple proof due to Irit Dinur [ECCC, TR05-046]! Based on some ideas promoted in [Dinur- Reingold 04]. Remarkably simple novel proof. Leads to new quantitative results too!

More information

6.842 Randomness and Computation Lecture 5

6.842 Randomness and Computation Lecture 5 6.842 Randomness and Computation 2012-02-22 Lecture 5 Lecturer: Ronitt Rubinfeld Scribe: Michael Forbes 1 Overview Today we will define the notion of a pairwise independent hash function, and discuss its

More information

Discrete Mathematics and Probability Theory Spring 2014 Anant Sahai Note 10

Discrete Mathematics and Probability Theory Spring 2014 Anant Sahai Note 10 EECS 70 Discrete Mathematics and Probability Theory Spring 2014 Anant Sahai Note 10 Introduction to Basic Discrete Probability In the last note we considered the probabilistic experiment where we flipped

More information

Dinur s Proof of the PCP Theorem

Dinur s Proof of the PCP Theorem Dinur s Proof of the PCP Theorem Zampetakis Manolis School of Electrical and Computer Engineering National Technical University of Athens December 22, 2014 Table of contents 1 Introduction 2 PCP Theorem

More information

Lecture 22: Counting

Lecture 22: Counting CS 710: Complexity Theory 4/8/2010 Lecture 22: Counting Instructor: Dieter van Melkebeek Scribe: Phil Rydzewski & Chi Man Liu Last time we introduced extractors and discussed two methods to construct them.

More information

Lecture 2: November 9

Lecture 2: November 9 Semidefinite programming and computational aspects of entanglement IHP Fall 017 Lecturer: Aram Harrow Lecture : November 9 Scribe: Anand (Notes available at http://webmitedu/aram/www/teaching/sdphtml)

More information

Notes on Complexity Theory Last updated: November, Lecture 10

Notes on Complexity Theory Last updated: November, Lecture 10 Notes on Complexity Theory Last updated: November, 2015 Lecture 10 Notes by Jonathan Katz, lightly edited by Dov Gordon. 1 Randomized Time Complexity 1.1 How Large is BPP? We know that P ZPP = RP corp

More information

Lecture 59 : Instance Compression and Succinct PCP s for NP

Lecture 59 : Instance Compression and Succinct PCP s for NP IITM-CS6840: Advanced Complexity Theory March 31, 2012 Lecture 59 : Instance Compression and Succinct PCP s for NP Lecturer: Sivaramakrishnan N.R. Scribe: Prashant Vasudevan 1 Introduction Classical Complexity

More information

A New Multilayered PCP and the Hardness of Hypergraph Vertex Cover

A New Multilayered PCP and the Hardness of Hypergraph Vertex Cover A New Multilayered PCP and the Hardness of Hypergraph Vertex Cover Irit Dinur Venkatesan Guruswami Subhash Khot Oded Regev April, 2004 Abstract Given a k-uniform hypergraph, the Ek-Vertex-Cover problem

More information

PCP Theorem and Hardness of Approximation

PCP Theorem and Hardness of Approximation PCP Theorem and Hardness of Approximation An Introduction Lee Carraher and Ryan McGovern Department of Computer Science University of Cincinnati October 27, 2003 Introduction Assuming NP P, there are many

More information

Notes 6 : First and second moment methods

Notes 6 : First and second moment methods Notes 6 : First and second moment methods Math 733-734: Theory of Probability Lecturer: Sebastien Roch References: [Roc, Sections 2.1-2.3]. Recall: THM 6.1 (Markov s inequality) Let X be a non-negative

More information

Locally Expanding Hypergraphs and the Unique Games Conjecture

Locally Expanding Hypergraphs and the Unique Games Conjecture Locally Expanding Hypergraphs and the Unique Games Conjecture Eric Purdy September 25, 2008 Abstract We examine the hardness of approximating constraint satisfaction problems with k-variable constraints,

More information

CONSTRAINED PERCOLATION ON Z 2

CONSTRAINED PERCOLATION ON Z 2 CONSTRAINED PERCOLATION ON Z 2 ZHONGYANG LI Abstract. We study a constrained percolation process on Z 2, and prove the almost sure nonexistence of infinite clusters and contours for a large class of probability

More information

The PCP Theorem by Gap Amplification

The PCP Theorem by Gap Amplification Electronic Colloquium on Computational Complexity, Report No. 46 (2005) The PCP Theorem by Gap Amplification Irit Dinur April 16, 2005 Abstract Let C = {c 1,..., c n } be a set of constraints over a set

More information

Coupling. 2/3/2010 and 2/5/2010

Coupling. 2/3/2010 and 2/5/2010 Coupling 2/3/2010 and 2/5/2010 1 Introduction Consider the move to middle shuffle where a card from the top is placed uniformly at random at a position in the deck. It is easy to see that this Markov Chain

More information

U.C. Berkeley CS294: Beyond Worst-Case Analysis Handout 8 Luca Trevisan September 19, 2017

U.C. Berkeley CS294: Beyond Worst-Case Analysis Handout 8 Luca Trevisan September 19, 2017 U.C. Berkeley CS294: Beyond Worst-Case Analysis Handout 8 Luca Trevisan September 19, 2017 Scribed by Luowen Qian Lecture 8 In which we use spectral techniques to find certificates of unsatisfiability

More information

Lecture 6: Random Walks versus Independent Sampling

Lecture 6: Random Walks versus Independent Sampling Spectral Graph Theory and Applications WS 011/01 Lecture 6: Random Walks versus Independent Sampling Lecturer: Thomas Sauerwald & He Sun For many problems it is necessary to draw samples from some distribution

More information

Notes for Lecture 2. Statement of the PCP Theorem and Constraint Satisfaction

Notes for Lecture 2. Statement of the PCP Theorem and Constraint Satisfaction U.C. Berkeley Handout N2 CS294: PCP and Hardness of Approximation January 23, 2006 Professor Luca Trevisan Scribe: Luca Trevisan Notes for Lecture 2 These notes are based on my survey paper [5]. L.T. Statement

More information

P, NP, NP-Complete, and NPhard

P, NP, NP-Complete, and NPhard P, NP, NP-Complete, and NPhard Problems Zhenjiang Li 21/09/2011 Outline Algorithm time complicity P and NP problems NP-Complete and NP-Hard problems Algorithm time complicity Outline What is this course

More information

Probabilistically Checkable Proofs

Probabilistically Checkable Proofs Probabilistically Checkable Proofs Madhu Sudan Microsoft Research June 11, 2015 TIFR: Probabilistically Checkable Proofs 1 Can Proofs be Checked Efficiently? The Riemann Hypothesis is true (12 th Revision)

More information

Lecture 7: More Arithmetic and Fun With Primes

Lecture 7: More Arithmetic and Fun With Primes IAS/PCMI Summer Session 2000 Clay Mathematics Undergraduate Program Advanced Course on Computational Complexity Lecture 7: More Arithmetic and Fun With Primes David Mix Barrington and Alexis Maciel July

More information

CS151 Complexity Theory. Lecture 6 April 19, 2017

CS151 Complexity Theory. Lecture 6 April 19, 2017 CS151 Complexity Theory Lecture 6 Shannon s counting argument frustrating fact: almost all functions require huge circuits Theorem (Shannon): With probability at least 1 o(1), a random function f:{0,1}

More information

Label Cover Algorithms via the Log-Density Threshold

Label Cover Algorithms via the Log-Density Threshold Label Cover Algorithms via the Log-Density Threshold Jimmy Wu jimmyjwu@stanford.edu June 13, 2017 1 Introduction Since the discovery of the PCP Theorem and its implications for approximation algorithms,

More information

Complexity Classes V. More PCPs. Eric Rachlin

Complexity Classes V. More PCPs. Eric Rachlin Complexity Classes V More PCPs Eric Rachlin 1 Recall from last time Nondeterminism is equivalent to having access to a certificate. If a valid certificate exists, the machine accepts. We see that problems

More information

6.045: Automata, Computability, and Complexity (GITCS) Class 15 Nancy Lynch

6.045: Automata, Computability, and Complexity (GITCS) Class 15 Nancy Lynch 6.045: Automata, Computability, and Complexity (GITCS) Class 15 Nancy Lynch Today: More Complexity Theory Polynomial-time reducibility, NP-completeness, and the Satisfiability (SAT) problem Topics: Introduction

More information

Lecture 11: Non-Interactive Zero-Knowledge II. 1 Non-Interactive Zero-Knowledge in the Hidden-Bits Model for the Graph Hamiltonian problem

Lecture 11: Non-Interactive Zero-Knowledge II. 1 Non-Interactive Zero-Knowledge in the Hidden-Bits Model for the Graph Hamiltonian problem CS 276 Cryptography Oct 8, 2014 Lecture 11: Non-Interactive Zero-Knowledge II Instructor: Sanjam Garg Scribe: Rafael Dutra 1 Non-Interactive Zero-Knowledge in the Hidden-Bits Model for the Graph Hamiltonian

More information

Complexity Theory VU , SS The Polynomial Hierarchy. Reinhard Pichler

Complexity Theory VU , SS The Polynomial Hierarchy. Reinhard Pichler Complexity Theory Complexity Theory VU 181.142, SS 2018 6. The Polynomial Hierarchy Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität Wien 15 May, 2018 Reinhard

More information

Dynamic Programming: Shortest Paths and DFA to Reg Exps

Dynamic Programming: Shortest Paths and DFA to Reg Exps CS 374: Algorithms & Models of Computation, Spring 207 Dynamic Programming: Shortest Paths and DFA to Reg Exps Lecture 8 March 28, 207 Chandra Chekuri (UIUC) CS374 Spring 207 / 56 Part I Shortest Paths

More information

Outline. Complexity Theory EXACT TSP. The Class DP. Definition. Problem EXACT TSP. Complexity of EXACT TSP. Proposition VU 181.

Outline. Complexity Theory EXACT TSP. The Class DP. Definition. Problem EXACT TSP. Complexity of EXACT TSP. Proposition VU 181. Complexity Theory Complexity Theory Outline Complexity Theory VU 181.142, SS 2018 6. The Polynomial Hierarchy Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität

More information

Reductions Between Expansion Problems

Reductions Between Expansion Problems Reductions Between Expansion Problems Prasad Raghavendra David Steurer Madhur Tulsiani November 11, 2010 Abstract The Small-Set Expansion Hypothesis (Raghavendra, Steurer, STOC 2010) is a natural hardness

More information

HARDNESS AMPLIFICATION VIA SPACE-EFFICIENT DIRECT PRODUCTS

HARDNESS AMPLIFICATION VIA SPACE-EFFICIENT DIRECT PRODUCTS HARDNESS AMPLIFICATION VIA SPACE-EFFICIENT DIRECT PRODUCTS Venkatesan Guruswami and Valentine Kabanets Abstract. We prove a version of the derandomized Direct Product lemma for deterministic space-bounded

More information

Lecture Notes Each circuit agrees with M on inputs of length equal to its index, i.e. n, x {0, 1} n, C n (x) = M(x).

Lecture Notes Each circuit agrees with M on inputs of length equal to its index, i.e. n, x {0, 1} n, C n (x) = M(x). CS 221: Computational Complexity Prof. Salil Vadhan Lecture Notes 4 February 3, 2010 Scribe: Jonathan Pines 1 Agenda P-/NP- Completeness NP-intermediate problems NP vs. co-np L, NL 2 Recap Last time, we

More information

U.C. Berkeley CS294: Beyond Worst-Case Analysis Handout 2 Luca Trevisan August 29, 2017

U.C. Berkeley CS294: Beyond Worst-Case Analysis Handout 2 Luca Trevisan August 29, 2017 U.C. Berkeley CS94: Beyond Worst-Case Analysis Handout Luca Trevisan August 9, 07 Scribe: Mahshid Montazer Lecture In this lecture, we study the Max Cut problem in random graphs. We compute the probable

More information

By allowing randomization in the verification process, we obtain a class known as MA.

By allowing randomization in the verification process, we obtain a class known as MA. Lecture 2 Tel Aviv University, Spring 2006 Quantum Computation Witness-preserving Amplification of QMA Lecturer: Oded Regev Scribe: N. Aharon In the previous class, we have defined the class QMA, which

More information

Theorem (Special Case of Ramsey s Theorem) R(k, l) is finite. Furthermore, it satisfies,

Theorem (Special Case of Ramsey s Theorem) R(k, l) is finite. Furthermore, it satisfies, Math 16A Notes, Wee 6 Scribe: Jesse Benavides Disclaimer: These notes are not nearly as polished (and quite possibly not nearly as correct) as a published paper. Please use them at your own ris. 1. Ramsey

More information

Lecture 4: Two-point Sampling, Coupon Collector s problem

Lecture 4: Two-point Sampling, Coupon Collector s problem Randomized Algorithms Lecture 4: Two-point Sampling, Coupon Collector s problem Sotiris Nikoletseas Associate Professor CEID - ETY Course 2013-2014 Sotiris Nikoletseas, Associate Professor Randomized Algorithms

More information

Lecture 26: Arthur-Merlin Games

Lecture 26: Arthur-Merlin Games CS 710: Complexity Theory 12/09/2011 Lecture 26: Arthur-Merlin Games Instructor: Dieter van Melkebeek Scribe: Chetan Rao and Aaron Gorenstein Last time we compared counting versus alternation and showed

More information

20.1 2SAT. CS125 Lecture 20 Fall 2016

20.1 2SAT. CS125 Lecture 20 Fall 2016 CS125 Lecture 20 Fall 2016 20.1 2SAT We show yet another possible way to solve the 2SAT problem. Recall that the input to 2SAT is a logical expression that is the conunction (AND) of a set of clauses,

More information

(x 1 +x 2 )(x 1 x 2 )+(x 2 +x 3 )(x 2 x 3 )+(x 3 +x 1 )(x 3 x 1 ).

(x 1 +x 2 )(x 1 x 2 )+(x 2 +x 3 )(x 2 x 3 )+(x 3 +x 1 )(x 3 x 1 ). CMPSCI611: Verifying Polynomial Identities Lecture 13 Here is a problem that has a polynomial-time randomized solution, but so far no poly-time deterministic solution. Let F be any field and let Q(x 1,...,

More information

Compute the Fourier transform on the first register to get x {0,1} n x 0.

Compute the Fourier transform on the first register to get x {0,1} n x 0. CS 94 Recursive Fourier Sampling, Simon s Algorithm /5/009 Spring 009 Lecture 3 1 Review Recall that we can write any classical circuit x f(x) as a reversible circuit R f. We can view R f as a unitary

More information

CS151 Complexity Theory. Lecture 13 May 15, 2017

CS151 Complexity Theory. Lecture 13 May 15, 2017 CS151 Complexity Theory Lecture 13 May 15, 2017 Relationship to other classes To compare to classes of decision problems, usually consider P #P which is a decision class easy: NP, conp P #P easy: P #P

More information